Ping Sweeps and Port Scans

1200 WordsMay 19, 20135 Pages
Ping Sweeps & Port Scans: Potential Dangers and Defense Strategies THIS IS MY ORIGINAL WORK, PLEASE DO NOT SUBMIT IT AS YOUR OWN, BUT USE IT AS A GUIDE WHILE WRITING YOUR OWN… I REQUEST YOU TO GIVE ME AN “A” RATING ON THIS PAPER; THANK YOU!!! Insert Your Name Name of University SEC 280 Week 1 Insert Tutor’s Name 1st, October, 2012 Outline 1) Introduction (pg.3) 2) Ping Sweeps & Port Scans (pg.3) a) Ping Sweeps (pg.3) b) Port Scans (pg.4) 3) Recommendations & Conclusion (pg.5) 4) References (pg.7) Ping Sweeps & Port Scans While running businesses, owners must be aware of crucial security threats that their organizations are exposed to in order to formulate…show more content…
Ippl is an IP protocol logger that runs in the background and listens for packets; hence, it is high profile ping sweep detection tool (Teo, 2002). b) Port Scans A port scan is another common network probe that is generally used by intruders to establish services that are actually running on the target machine (SANS Institute, 2002). Port scans allow intruders to establish vulnerable services in machines where attacks can be successfully launched. As such, a port scan refers to a process where a hacker attempts to establish a connection with target machine on various TCP or UDP ports in order to spot potential vulnerabilities of the system (Wild Packets, 2002). Port scans are generally easy to perform since it involves connecting to a series of ports on the target machine and identifying the ones that respond. Programmers can actually write a simple port scanner in a few minutes, but these are usually very easily detected by the operating system on the target machine as describe in the following paragraph. Detection and Defense against Port Scans Port scans are legally accepted unless an attacker uses information from a port scan to exploit vulnerabilities on a system (SANS Institute, 2002). As such, organizations must be more vigilant and protect their systems by minimizing information gained from port scans especially when running a publicly accessible web server. For instance, http should be the only service

More about Ping Sweeps and Port Scans

Open Document